Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

Journal

Institution
Keyword
Publication Year
Publication

Articles 1 - 30 of 826

Full-Text Articles in Entire DC Network

Development Of Cyber Security Platform For Experiential Learning, Abhishek Vaish, Ravindra Kumar, Samo Bobek, Simona Sternad Jun 2024

Development Of Cyber Security Platform For Experiential Learning, Abhishek Vaish, Ravindra Kumar, Samo Bobek, Simona Sternad

Journal of Cybersecurity Education, Research and Practice

The cyber security education market has grown-up exponentially, with a CAGR of 13.9 % as reported by Data Intelo. The report published by the World Economic Fo- rum 2023 indicates a shortfall of 2.27 million cyber security experts in 2021 across different roles and hence manifest that Skill-based cyber security education is the need of the hour. Cybersecurity as a field has evolved as a multi-discipline, multi-stakeholder and multi-role discipline. Therefore, the need to address formal education with an outcome-based philosophy is imperative to address for a wider audience with varied past training in their formal education. With the Internet …


An Alternative Approach To Data Carving Portable Document Format (Pdf) Files, Kevin Hughes, Michael Black Jun 2024

An Alternative Approach To Data Carving Portable Document Format (Pdf) Files, Kevin Hughes, Michael Black

Journal of Cybersecurity Education, Research and Practice

Traditional data carving relies on the successful identification of headers and trailers, unique hexadecimal signatures which are exclusive to specific file types. This can present a challenge for digital forensics examiners when pitted against modern anti-forensics techniques. The interest of this study is file signature obfuscation, a technique which alters headers and trailers. This research will focus on the development of a new, proof-of-concept algorithm that analyzes content in segments based on unique elements found within the body of a file. The file type being targeted is the Portable Document Format (PDF) and this research is built upon previously successful …


Research On Digital Twin-Driven Tracking, Positioning And Collision Detection Method Of Excavating And Anchoring Equipment, Yang Wenjuan, Zhao Dian, Zhang Xuhui, Chen Xin, Zheng Xili, Liu Yanhui, Zhang Ran, Wan Jicheng May 2024

Research On Digital Twin-Driven Tracking, Positioning And Collision Detection Method Of Excavating And Anchoring Equipment, Yang Wenjuan, Zhao Dian, Zhang Xuhui, Chen Xin, Zheng Xili, Liu Yanhui, Zhang Ran, Wan Jicheng

Coal Geology & Exploration

The automation of excavating and anchoring operation is critical for intelligent excavation of coal mine roadway. Aiming at the challenges of relative pose measurement and collision detection during the alternating operation of the current excavating and anchoring equipment, a digital twin-driven tracking, positioning and collision detection method was proposed. Firstly, in order to overcome the influence of low illumination, high dust and complex background interference in the underground excavating face, the multi-point infrared LED target is taken as the information source, the infrared LED feature point image is collected by industrial camera, the center of the spot is extracted using …


Security Fusion Method Of Physical Fitness Training Data Based On The Internet Of Things, Bin Zhou May 2024

Security Fusion Method Of Physical Fitness Training Data Based On The Internet Of Things, Bin Zhou

Turkish Journal of Electrical Engineering and Computer Sciences

Physical fitness training, an important way to improve physical fitness, is the basic guarantee for forming combat effectiveness. At present, the evaluation types of physical fitness training are mostly conducted manually. It has problems such as low efficiency, high consumption of human and material resources, and subjective factors affecting the evaluation results. ”Internet+” has greatly expanded the traditional network from the perspective of technological convergence and network coverage objects. It has expedited and promoted the rapid development of Internet of Things (IoT) technology and its applications. The IoT with many sensor nodes shows the characteristics of acquisition information redundancy, node …


Unveiling Anomalies: A Survey On Xai-Based Anomaly Detection For Iot, Esin Eren, Feyza Yildirim Okay, Suat Özdemi̇r May 2024

Unveiling Anomalies: A Survey On Xai-Based Anomaly Detection For Iot, Esin Eren, Feyza Yildirim Okay, Suat Özdemi̇r

Turkish Journal of Electrical Engineering and Computer Sciences

In recent years, the rapid growth of the Internet of Things (IoT) has raised concerns about the security and reliability of IoT systems. Anomaly detection is vital for recognizing potential risks and ensuring the optimal functionality of IoT networks. However, traditional anomaly detection methods often lack transparency and interpretability, hindering the understanding of their decisions. As a solution, Explainable Artificial Intelligence (XAI) techniques have emerged to provide human-understandable explanations for the decisions made by anomaly detection models. In this study, we present a comprehensive survey of XAI-based anomaly detection methods for IoT. We review and analyze various XAI techniques, including …


Surmounting Challenges In Aggregating Results From Static Analysis Tools, Dr. Ann Marie Reinhold, Brittany Boles, A. Redempta Manzi Muneza, Thomas Mcelroy, Dr. Clemente Izurieta May 2024

Surmounting Challenges In Aggregating Results From Static Analysis Tools, Dr. Ann Marie Reinhold, Brittany Boles, A. Redempta Manzi Muneza, Thomas Mcelroy, Dr. Clemente Izurieta

Military Cyber Affairs

Aggregation poses a significant challenge for software practitioners because it requires a comprehensive and nuanced understanding of raw data from diverse sources. Suites of static-analysis tools (SATs) are commonly used to assess organizational security but simultaneously introduce significant challenges. Challenges include unique results, scales, configuration environments for each SAT execution, and incompatible formats between SAT outputs. Here, we document our experiences addressing these issues. We highlight the problem of relying on a single vendor's SAT version and offer a solution for aggregating findings across multiple SATs, aiming to enhance software security practices and deter threats early with robust defensive operations.


Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin May 2024

Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin

Military Cyber Affairs

Automated approaches to cyber security based on machine learning will be necessary to combat the next generation of cyber-attacks. Current machine learning tools, however, are difficult to develop and deploy due to issues such as data availability and high false positive rates. Generative models can help solve data-related issues by creating high quality synthetic data for training and testing. Furthermore, some generative architectures are multipurpose, and when used for tasks such as intrusion detection, can outperform existing classifier models. This paper demonstrates how the future of cyber security stands to benefit from continued research on generative models.


Comparing Cognitive Theories Of Learning Transfer To Advance Cybersecurity Instruction, Assessment, And Testing, Daniel T. Hickey Ph.D., Ronald J. Kantor Apr 2024

Comparing Cognitive Theories Of Learning Transfer To Advance Cybersecurity Instruction, Assessment, And Testing, Daniel T. Hickey Ph.D., Ronald J. Kantor

Journal of Cybersecurity Education, Research and Practice

The cybersecurity threat landscape evolves quickly, continually, and consequentially. This means that the transfer of cybersecurity learning is crucial. We compared how different recognized “cognitive” transfer theories might help explain and synergize three aspects of cybersecurity education. These include teaching and training in diverse settings, assessing learning formatively & summatively, and testing & measuring achievement, proficiency, & readiness. We excluded newer sociocultural theories and their implications for inclusion as we explore those theories elsewhere. We first summarized the history of cybersecurity education and proficiency standards considering transfer theories. We then explored each theory and reviewed the most relevant cybersecurity education …


Operation Process Identification For Intelligent Drill Rig Base On Analytic Hierarchy Process, Zhu Qianxiang, Luo Pengping, Wang Longpeng, Xing Wang, Wang Tianlong Mar 2024

Operation Process Identification For Intelligent Drill Rig Base On Analytic Hierarchy Process, Zhu Qianxiang, Luo Pengping, Wang Longpeng, Xing Wang, Wang Tianlong

Coal Geology & Exploration

It is very difficult to automatically identify the current process during the intelligent construction of coal mine drill rigs. In response to this, an operation process identification method was proposed, which includes hierarchical modeling of drill rig operation and probability inference of process execution. Firstly, the coupling process among the components of different granularity during the operation of drill rig is described and modeled based on the hierarchical analysis method, which reveals the interactive characteristics between equipment, function and system during the execution of each process. Secondly, Bayesian probabilistic reasoning method is introduced based on the above research to establish …


Research On Chinese Data Sovereignty Policy Based On Lda Model And Policy Instruments, Han Qiao, Junru Xu Mar 2024

Research On Chinese Data Sovereignty Policy Based On Lda Model And Policy Instruments, Han Qiao, Junru Xu

Bulletin of Chinese Academy of Sciences (Chinese Version)

Data sovereignty has become an important component of national sovereignty in the dual context of the digital economy development and the overall national security concept. Major countries and regions are actively carrying out data sovereignty strategic deployment and engaging in fierce competition in data resources, data technology, and data rules. This work adopts the policy text analysis method to study China’s data sovereignty policy, and employs the LDA model and policy instruments to quantitatively analyze the process evolution and thematic characteristics of China’s data sovereignty policy. Drawing on these findings, this study comprehensively considers the global data sovereignty policy and …


A Distributed Simulation System For Space Operation Missions, Yunzhao Liu, Mingming Wang, Jintao Li, Chuankai Liu, Jianjun Luo Mar 2024

A Distributed Simulation System For Space Operation Missions, Yunzhao Liu, Mingming Wang, Jintao Li, Chuankai Liu, Jianjun Luo

Journal of System Simulation

Abstract: For the ground verification requirements of complex space operation missions such as noncooperative target capture, on-orbit maintenance, and in-space assembly, a distributed simulation system is developed, which mainly consists of a back-end simulation model, a front-end visual demonstration system, and a front-end main controller. In order to realize the multidisciplinary model coupling and interaction among different modeling tools or programming languages, the functional mock-up interface (FMI) standard is introduced for system integration, improving the modularity, generality, and portability of the system. To fully utilize computing resources and improve the simulation efficiency, simulation subsystems and modules are deployed in a …


Research On Hybrid Experimental Scheme Design For Combat Simulation, Fei Liu, Peng Lai, Yingbo Lu, Min Wang, Zhifeng Lu Mar 2024

Research On Hybrid Experimental Scheme Design For Combat Simulation, Fei Liu, Peng Lai, Yingbo Lu, Min Wang, Zhifeng Lu

Journal of System Simulation

Abstract: Combat simulation experimental design refers to sampling the values of experimental factors based on baseline combat scenarios using various experimental design methods and then generating a set of experimental schemes for the sequential simulation. The complexity of combat simulation, such as numerous experimental factors and distinct factor types, including continuous and discrete numeric types, poses several challenges and requires efficient hybrid experimental design methods. To address these issues, this paper conducts a study on the hybrid experimental scheme design for combat simulation. This paper gives a brief classification and review of experimental design methods and presents three hybrid experimental …


Navigating The Digital Frontier: The Intersection Of Cybersecurity Challenges And Young Adult Life, Hannarae Lee Feb 2024

Navigating The Digital Frontier: The Intersection Of Cybersecurity Challenges And Young Adult Life, Hannarae Lee

International Journal of Cybersecurity Intelligence & Cybercrime

Papers from this issue advocate for empowering young adults with knowledge and tools to navigate cyberspace safely, emphasizing the necessity of heightened cybersecurity measures and proactive education. As we advance into the digital abyss, this call becomes imperative, ensuring that the young adults' experience remains a journey of growth and enlightenment, unaffected by the shadows of unseen online threats.


The Need For A Cybersecurity Education Program For Internet Users With Limited English Proficiency: Results From A Pilot Study, Fawn T. Ngo, Rustu Deryol, Brian Turnbull, Jack Drobisz Feb 2024

The Need For A Cybersecurity Education Program For Internet Users With Limited English Proficiency: Results From A Pilot Study, Fawn T. Ngo, Rustu Deryol, Brian Turnbull, Jack Drobisz

International Journal of Cybersecurity Intelligence & Cybercrime

According to security experts, cybersecurity education and awareness at the user level are key in combating cybercrime. Hence, in the U.S., cybersecurity and Internet safety workshops, classes, and resources targeting children, adolescents, adults, and senior citizens abound. However, most cybercrime prevention programs are only available in English, thus, ignoring a substantial proportion of Internet users and potential cybercrime victims—Internet users with limited English proficiency (LEP). Yet, successfully combating cybercrime requires that all computer and Internet users, regardless of their language abilities and skills, have access to pertinent cybersecurity information and resources to protect themselves online. This paper presents the results …


Blockchain Applications In Higher Education Based On The Nist Cybersecurity Framework, Brady Lund Ph.D. Feb 2024

Blockchain Applications In Higher Education Based On The Nist Cybersecurity Framework, Brady Lund Ph.D.

Journal of Cybersecurity Education, Research and Practice

This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized identity, and smart contracts, and examines the application of secure blockchain across various educational functions such as enrollment management, degree auditing, and award processing. Each facet of the NIST Framework is utilized to explore the integration of blockchain technology and address persistent security concerns. The paper contributes to the literature by defining blockchain technology applications and opportunities within …


Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger Feb 2024

Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger

Journal of Cybersecurity Education, Research and Practice

This article explores the results of a project aimed at supporting community college students in their academic pursuit of an Associate of Applied Science (AAS) degree in Cybersecurity through mentorship, collaboration, skill preparation, and other activities and touch points to increase students’ sense of belonging and connectedness in the cybersecurity profession. The goal of the project was focused on developing diverse, educated, and skilled cybersecurity personnel for employment within local industry and government to help curtail the current regional cybersecurity workforce gap that is emblematic of the lack of qualified cybersecurity personnel that presently exists nationwide. Emphasis throughout the project …


University Of Johannesburg Institutional Repository Cybersecurity Output: 2015-2021 Interdisciplinary Study, Mancha J. Sekgololo Feb 2024

University Of Johannesburg Institutional Repository Cybersecurity Output: 2015-2021 Interdisciplinary Study, Mancha J. Sekgololo

Journal of Cybersecurity Education, Research and Practice

This study examines cybersecurity awareness in universities by analyzing related research output across different disciplines at the University of Johannesburg. The diffusion of innovation theory is used in this study as a theoretical framework to explain how cybersecurity awareness diffuses across disciplines. The University of Johannesburg Institutional Repository database was the data source for this study. Variations in cybersecurity keyword searches and topic modeling techniques were used to identify the frequency and distribution of research output across different disciplines. The study reveals that cybersecurity awareness has diffused across various disciplines, including non-computer science disciplines such as business, accounting, and social …


Optimal Dispatch Of Microgrid Clusters Considering Energy Storage Life And Communication Failures, Jianfang Jiao, Anjie Wang, Guang Wang, Jiale Xie Feb 2024

Optimal Dispatch Of Microgrid Clusters Considering Energy Storage Life And Communication Failures, Jianfang Jiao, Anjie Wang, Guang Wang, Jiale Xie

Journal of System Simulation

Abstract: To ensure the economy and stability of microgrid operation, the power fluctuations of renewable energy source (RES) and the lifetime characteristics of battery energy storage system (BESS) should be considered. The influence of charging and discharging depth and rate on the lifetime of BESS is researched, a model of battery energy storage system for real-time optimal scheduling is established, and the alternating direction method of multipliers is adopted for the distributed optimal scheduling of microgrid clusters. The distributed optimization method does not require any global information and can protect the privacy of microgrid in the maximum extent. Simulation results …


Longitudinal Attacks Against Iterative Data Collection With Local Differential Privacy, Mehmet Emre Gürsoy Feb 2024

Longitudinal Attacks Against Iterative Data Collection With Local Differential Privacy, Mehmet Emre Gürsoy

Turkish Journal of Electrical Engineering and Computer Sciences

Local differential privacy (LDP) has recently emerged as an accepted standard for privacy-preserving collection of users’ data from smartphones and IoT devices. In many practical scenarios, users’ data needs to be collected repeatedly across multiple iterations. In such cases, although each collection satisfies LDP individually by itself, a longitudinal collection of multiple responses from the same user degrades that user’s privacy. To demonstrate this claim, in this paper, we propose longitudinal attacks against iterative data collection with LDP. We formulate a general Bayesian adversary model, and then individually show the application of this adversary model on six popular LDP protocols: …


Privacy Principles And Harms: Balancing Protection And Innovation, Samuel Aiello Feb 2024

Privacy Principles And Harms: Balancing Protection And Innovation, Samuel Aiello

Journal of Cybersecurity Education, Research and Practice

In today's digitally connected world, privacy has transformed from a fundamental human right into a multifaceted challenge. As technology enables the seamless exchange of information, the need to protect personal data has grown exponentially. Privacy has emerged as a critical concern in the digital age, as technological advancements continue to reshape how personal information is collected, stored, and utilized. This paper delves into the fundamental principles of privacy and explores the potential harm that can arise from the mishandling of personal data. It emphasizes the delicate balance between safeguarding individuals' privacy rights and fostering innovation in a data-driven society. By …


Yolov8-Cab: Improved Yolov8 For Real-Time Object Detection, Moahaimen Talib, Ahmed H. Y. Al-Noori, Jameelah Suad Jan 2024

Yolov8-Cab: Improved Yolov8 For Real-Time Object Detection, Moahaimen Talib, Ahmed H. Y. Al-Noori, Jameelah Suad

Karbala International Journal of Modern Science

This study presents a groundbreaking approach to enhance the accuracy of the YOLOv8 model in object detection, focusing mainly on addressing the limitations of detecting objects in varied image types, particularly for small objects. The proposed strategy of this work incorporates the Context Attention Block (CAB) to effectively locate and identify small objects in images. Furthermore, the proposed work improves the feature extraction capability without increasing model complexity by increasing the thickness of the Coarse-to-Fine(C2F) block. In addition, Spatial Attention (SA) has been modified to accelerate detection performance. The enhanced YOLOv8 model (Namely YOLOv8-CAB) strongly emphasizes the performance of detecting …


Digital Scientists And Parallel Sciences: The Origin And Goal Of Ai For Science And Science For Ai, Feiyue Wang, Yutong Wang Jan 2024

Digital Scientists And Parallel Sciences: The Origin And Goal Of Ai For Science And Science For Ai, Feiyue Wang, Yutong Wang

Bulletin of Chinese Academy of Sciences (Chinese Version)

Based on recent development in foundation model, parallel intelligence, decentralized science (DeSci), and other artificial intelligence (AI) technologies, from AI for Science (AI4S) to Science for AI (S4AI), this study discusses parallel sciences and digital scientists, and their impact and significance in paradigm shift for research and development as well as Industry 5.0 and intelligent industry, which demonstrate that paradigm shift is emerging and accelerating, and we must be prepared.


Strategic Research On Information Technology Promoting National Governance Modernization—Review On The S70th Xiangshan Science Conferences, Chao Zhang, Weiyu Duan, Kaihua Chen, Xiaoguang Yang, Yuntao Long Jan 2024

Strategic Research On Information Technology Promoting National Governance Modernization—Review On The S70th Xiangshan Science Conferences, Chao Zhang, Weiyu Duan, Kaihua Chen, Xiaoguang Yang, Yuntao Long

Bulletin of Chinese Academy of Sciences (Chinese Version)

This study systematically summarizes the reports and speeches of the S70th Xiangshan Science Conferences on the theme of “Strategic Research on Information Technology Promoting the National Governance Modernization” and summarizes the consensus of the conference in the following three aspects. (1) Important progress and achievements have been made in the four typical areas, i.e., smart justice, internet governance, data governance, and emergency management. (2) Using information technology to promote the modernization of national governance is confronted with unprecedented opportunities and challenges. And (3) it is necessary to take a series of effective measures to promote information technology to facilitate the …


Market Analysis And Bidding Strategy Of Hybrid Renewable Energy Systems Considering Emissions, Fatma Elzahraa, Mohamed Elnemr, Samir Dawoud Jan 2024

Market Analysis And Bidding Strategy Of Hybrid Renewable Energy Systems Considering Emissions, Fatma Elzahraa, Mohamed Elnemr, Samir Dawoud

Journal of Engineering Research

The competition in the electricity markets makes it difficult to choose a suitable strategy for maximizing profit while reducing harmful emissions. To have an adequate energy price for consumers while minimizing the harmful emissions to the atmosphere and maximizing profits of all participants in the electricity market needs an aggressive bidding strategy. Developing these bidding strategies with the integration of renewable energy (RE) in the electricity market became important. This research studies various bidding strategies for maximizing profits in the deregulated energy market since participants are keen on developing bidding strategies considering emissions. These bidding strategies will consider the integration …


Underwater Image Enhancement Algorithm For Dual Color Spaces, Xingsheng Shen, Yalin Song, Shichang Li, Xiaoshu Hu Jan 2024

Underwater Image Enhancement Algorithm For Dual Color Spaces, Xingsheng Shen, Yalin Song, Shichang Li, Xiaoshu Hu

Journal of Marine Science and Technology

Targeting issues related to low contrast, blurring, and loss of detail prevalent in underwater image enhancement algorithms, we propose a dual-color space multiscale residual network (DMR-SCNet) based on SCNet. First, we introduce the HSV color space feature extraction module, which aims to optimize the color representation and saturation of underwater images. Subsequently, we propose the RGB color space denoising module, which focuses on repairing the content and structure of underwater images to enhance their clarity and visual quality. Finally, by designing the residual attention (RAB) module, we aim to further refine the detailed representation and feature extraction of underwater images. …


Social Media Marketing Audiences And Adaptive Behavior In Brunei: Sem Analysis Using Smartpls, Shahid Anjum, Asmah Ahmad, Jefri Basiuni, Najeeba Tazeen Jan 2024

Social Media Marketing Audiences And Adaptive Behavior In Brunei: Sem Analysis Using Smartpls, Shahid Anjum, Asmah Ahmad, Jefri Basiuni, Najeeba Tazeen

ASEAN Journal on Science and Technology for Development

The social media and Internet technology penetrations and usage are quite high in Brunei Darussalam. The use of social media marketing among micro, small, and relatively medium businesses to promote their products has also grown as businesses desire to engage and build relationships with customers through social media. This has generated an interest in studying the adaption of social media marketing campaigns among customers, which indirectly determines the effectiveness of social media marketing itself, as well as in studying the facilitation factors for such an adaption. Technology Acceptance Model (TAM) has been used extensively because of its simplicity and usefulness. …


Outsourcing Voting To Ai: Can Chatgpt Advise Index Funds On Proxy Voting Decisions?, Chen Wang Dec 2023

Outsourcing Voting To Ai: Can Chatgpt Advise Index Funds On Proxy Voting Decisions?, Chen Wang

Fordham Journal of Corporate & Financial Law

Released in November 2022, Chat Generative Pre-training Transformer (“ChatGPT”), has risen rapidly to prominence, and its versatile capabilities have already been shown in a variety of fields. Due to ChatGPT’s advanced features, such as extensive pre-training on diverse data, strong generalization ability, fine-tuning capabilities, and improved reasoning, the use of AI in the legal industry could experience a significant transformation. Since small passive funds with low-cost business models generally lack the financial resources to make informed proxy voting decisions that align with their shareholders’ interests, this Article considers the use of ChatGPT to assist small investment funds, particularly small passive …


Visitor Decision System In Selection Of Tourist Sites Based On Hybrid Of Chi-Square And K-Nn Methods, Devie Rosa Anamisa, Fifin Ayu Mufarroha, Achmad Jauhari Dec 2023

Visitor Decision System In Selection Of Tourist Sites Based On Hybrid Of Chi-Square And K-Nn Methods, Devie Rosa Anamisa, Fifin Ayu Mufarroha, Achmad Jauhari

Elinvo (Electronics, Informatics, and Vocational Education)

Madura Island is one of the islands with a lot of tourism spread over four districts, such as natural, religious, and cultural tourism. And every year, various visitors visit various tourist sites in Madura, so an increase in the number of visitors has been found in multiple places. This is influenced in addition to the type of tourist attraction but also changes in tourist behavior in making decisions to visit tourist objects. Most of the researchers have applied the right decision-making with intelligence-based measurement. However, the accuracy obtained has not yet reached the optimal solution. Therefore, this study uses the …


Classification Of Beef And Pork Images Based On Color Features And Pseudo Nearest Neighbor Rule, Ahmad Awaluddin Baiti, Muhammad Fachrie, Saucha Diwandari Dec 2023

Classification Of Beef And Pork Images Based On Color Features And Pseudo Nearest Neighbor Rule, Ahmad Awaluddin Baiti, Muhammad Fachrie, Saucha Diwandari

Elinvo (Electronics, Informatics, and Vocational Education)

This research is motivated by the need for halal foods in Muslim society with the purpose of avoiding non-halal foods, such as pork, that are sold in the market. Although beef and pork basically have different characteristics, not all Muslims know the differences. Moreover, people nowadays sell beef mixed with pork to obtain more profits. Hence, this paper proposed the implementation of the Pseudo-Nearest Neighbor Rule (PNNR) in classifying images of beef and pork slices based on color features. Based on the image dataset that has been collected, the very significant difference that can be identified visually between beef and …


Usability Of Mobile Application For Implementing Genetic Counselling Intervention Among Thalassemia Patients And Caregivers: A Case Study Of Cyber Gen, Henri Setiawan, Nur Hidayat, Atun Farihatun, Marlina Indriastuti, Rudi Kurniawan, Andan Firmansyah, Esti Andarini, Yudisa Diaz Lutfi Sandi Dec 2023

Usability Of Mobile Application For Implementing Genetic Counselling Intervention Among Thalassemia Patients And Caregivers: A Case Study Of Cyber Gen, Henri Setiawan, Nur Hidayat, Atun Farihatun, Marlina Indriastuti, Rudi Kurniawan, Andan Firmansyah, Esti Andarini, Yudisa Diaz Lutfi Sandi

Elinvo (Electronics, Informatics, and Vocational Education)

Utilization of communication and information technology has been widely used in the health sector, especially nursing. As one of the nursing interventions for thalassemia patients and caregivers, genetic counseling is not only done face to face but can use android-based telenursing facilities through the complete features available in the Cyber Gen application. This study aims to measure the usability level of Cyber Gen application as an indirect genetic counseling medium for thalassemia patients. This application was developed with four main services: basic information about diseases, consultation rooms, social support, and direct surveys. This application is built using the Flutter Framework, …